Research Article
A2 Chain: A Blockchain-Based Decentralized Authentication Scheme for 5G-Enabled IoT
Table 2
Security comparison of different schemes.
| | [37] | [17] | [18] | [28] | [29] | [50] | A2 Chain |
| Sybil | ✓ | ✓ | ✓ | ✓ | ✓ | | ✓ | Message replay | ✓ | ✓ | ✓ | ✓ | ✓ | | ✓ | DOS | | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Scalability | ✓ | ✓ | | ✓ | ✓ | ✓ | ✓ | Cross-domain authentication | ✓ | | | | | ✓ | ✓ | Decentralization | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
|
|